CVE-2025-44002

6.1 MEDIUM

📋 TL;DR

A race condition vulnerability in TeamViewer's directory validation logic allows local non-admin users to create arbitrary files with SYSTEM privileges via symbolic link manipulation. This affects TeamViewer Full Client and Host versions prior to 15.69 on Windows systems. Attackers could potentially cause denial-of-service conditions or escalate privileges.

💻 Affected Systems

Products:
  • TeamViewer Full Client
  • TeamViewer Host
Versions: All versions prior to 15.69
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Requires local non-admin access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers could create malicious files in system directories, potentially leading to privilege escalation, system compromise, or persistent backdoors.

🟠

Likely Case

Denial-of-service conditions by overwriting critical system files or creating files that disrupt normal system operations.

🟢

If Mitigated

Limited to denial-of-service with proper access controls and monitoring in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to disrupt systems or escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and timing precision due to race condition nature. Symbolic link manipulation adds complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.69 or later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1003/

Restart Required: No

Instructions:

1. Open TeamViewer application. 2. Go to Help > Check for new version. 3. Follow prompts to update to version 15.69 or later. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Restrict local user access

all

Limit non-admin user access to systems running vulnerable TeamViewer versions

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems
  • Monitor for suspicious file creation activities in system directories

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer version in Help > About. If version is below 15.69, system is vulnerable.

Check Version:

wmic product where name="TeamViewer" get version

Verify Fix Applied:

Confirm TeamViewer version is 15.69 or higher in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation events in system directories
  • Multiple rapid file operations from TeamViewer processes

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

EventID=4663 AND ProcessName="TeamViewer*.exe" AND ObjectName="C:\Windows\*" OR ObjectName="C:\Program Files\*"

🔗 References

📤 Share & Export